Change search
ReferencesLink to record
Permanent link

Direct link
IT-säkerhet: Största IT-säkerhetshoten mot svenska företag och organisationer idag, samt kontemporära bekämpningsmetoder och verktyg mot dessa IT-säkerhetshot.
Umeå University, Faculty of Science and Technology, Department of Applied Physics and Electronics.
2016 (Swedish)Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesisAlternative title
IT-Security : Contemporary IT-security threats against swedish companies and organizations and methods to combat these IT-security threats. (English)
Abstract [sv]

Olika former av IT-relaterade hot har förekommit sedan internets födelse. Inledningsvis var de harmlösa humoristiska program som över tiden utvecklades till kriminella verktyg med ekonomiska syften. Elakartad programkod benämns under samlingsnamnet Malware. En angripare besitter idag ett stort antal metoder för otillåten tillgång till system, neka legitima användare tillgång till system eller på ett stort antal sätt bedriva kriminell verksamhet av ekonomisk karaktär.

Skydds- och bekämpningsmetoderna innefattar brandväggar, olika analys-, detektions- och preventionssystem (IDS/IPS) och kryptering. Men för att komma tillrätta med IT-hoten fullt ut krävs också säkerhetsutbildning och incidenthantering som sker via incidentplanering, rapporter, dokumentation, backup och informationsklassning.

Kontemporära IT-säkerhetshot av betydande art belyses i rapporten. Stuxnet (2009), som angrep Irans kärnvapenforskning. Flamer (2011), ett cybervapen vars syfte är spårlös informationsinhämtning. BlackEnergy (2015) och angreppet mot elförsörjningen i Ukraina. DDoS-attacken mot Svenska medier behandlas liksom Petya (2016) som är nya generationens Ransomeware.

Det är vitalt för företag och organisationer att skydda sin viktigaste tillgång, informationen. Både mot cyberkriminella element i rent finansiellt syfte men i tilltagande grad också mot olika cybervapen och möjligtvis också mot cyberterrorism.

Abstract [en]

A number of IT-related threats have emerged since the birth of internet. In the beginning they were harmless but over time they developed into fearsome criminal tools for economic purposes. The collective name for such code is Malware. An attacker has a vast variety of tools at their disposal for unauthorized access, depriving legitimate users of their access or in other ways practice criminal activity for economic gain among other things.

Protective and Counter measures include Firewalls, different Analyze and Detection systems (IDS/IPS) and Chryptology. But in order to fully combat the IT-threats, Security education and Incident management is needed through incident planning, reports, documentation, backup and information classing.

Contemporary threats of significance are elucidated. Stuxnet (2009), which halted the Iranian nuclear weapons research. Flamer (2010), a Cyber weapon developed for traceless information gathering. BlackEnergy (2015) and the attack on the power supply in the Ukraine. The DDoS-attack on Swedish media aswell as Petya (2016) which is the next gen Ransomeware.

It’s vital for businesses and organizations to protect their most vital asset, information. Both against cybercriminals but also against the increasing threat of cyber weapons and cyberterrorism.

Place, publisher, year, edition, pages
2016. , 75 p.
Series
Medier & kommunikation, ISSN 1104-067X ; 1609
Keyword [sv]
IT-säkerhet, IT-säkerhetshot, bekämpningsmetoder, bekämpningsverktyg
National Category
Computer Systems Communication Systems Telecommunications
Identifiers
URN: urn:nbn:se:umu:diva-122035OAI: oai:DiVA.org:umu-122035DiVA: diva2:936699
External cooperation
ITS och Atea
Educational program
University Programme in Computer Networks and Communication Technology
Presentation
2016-06-01, TA208, Umeå, 12:54 (Swedish)
Supervisors
Examiners
Available from: 2016-08-24 Created: 2016-06-14 Last updated: 2016-08-24Bibliographically approved

Open Access in DiVA

fulltext(4081 kB)8 downloads
File information
File name FULLTEXT01.pdfFile size 4081 kBChecksum SHA-512
8632d75ff795ff8c146cbe7abb23146b3e8896177b4de3b70ff5d3a2b05df8ed5efb5fe7eb2d3a6bb4fe8995c90a4d212c2082cee632e0c949a14dee20c58b7b
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Lundström, Benjamin
By organisation
Department of Applied Physics and Electronics
Computer SystemsCommunication SystemsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 8 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 17 hits
ReferencesLink to record
Permanent link

Direct link